Long-term Time-share Guarantees are Necessary for Wireless LANs

Size: px
Start display at page:

Download "Long-term Time-share Guarantees are Necessary for Wireless LANs"

Transcription

1 Long-term Time-share Guarantees are Necessary for Wireless LANs Godfrey Tan and John Guttag MIT Computer Science and Artificial Intelligence Laboratory {godfreyt, Abstract Wireless local area networks (WLANs) based on a family of 8. technologies are becoming ubiquitous. These technologies support multiple data transmission rates. Transmitting at a lower data rate (by using a more resilient modulation scheme) increases the frame transmission time but reduces the bit error rate. In non-cooperative environments such as public hot-spots, individual nodes attempt to maximize their achieved throughput by adjusting the data rate or frame size used, irrespective of the impact of this on overall system performance. In a series of experiments, we demonstrate that the existing distributed MAC protocol encourages non-cooperative nodes to use globally inefficient transmission strategies that lead to degraded aggregate throughputs. We also show that by establishing independence between the allocation of the shared channel time and the strategies used by individual nodes, an improved MAC protocol can lead rational but non-cooperative nodes to make choices that increase aggregate throughputs by as much as % under some conditions. Introduction 8. is the de facto wireless networking standard. An 8. network may operate in two modes. In the infrastructure mode, a mobile node or station equipped with an 8.b interface communicates via an access point or base station that is connected to the Internet, typically via a wired network. In the ad hoc mode, mobile nodes communicate in a peer-to-peer fashion in the absence of access points. This paper deals with issues related to the way in which 8. WLANs resolve contention for the channel in noncooperative environments, such as public hot-spots (e.g. WLANs at airports and coffee shops) or private enterprises that are physically close to each other (e.g. neighboring office suites in a commercial building or neighbor residences). The phenomenon observed in this paper applies to 8. networks running in either the infrastructure mode or the ad hoc mode. In non-cooperative environments, multiple nodes may compete for channel access in a rational but non-cooperative manner. That is each competing node will maximize its utility regardless of what other TCP Throughput with RTS/CTS Enabled (Mbps) Mbps 5.5 Mbps Mbps Distance between sender and receiver (meters) Figure : TCP throughputs achieved at various data rates in a simulated environment. nodes achieve. We assume that the utility of each node is its achieved throughput. During congested periods, contention among nodes significantly affects the performance of indoor wireless systems. The bandwidth of the.ghz band used by 8. is only wide enough for orthogonal 8.b or 8.g channels, i.e., a maximum of nodes can simultaneously transmit data with little interference. Contention among nodes using the same channel is resolved using a distributed medium access protocol (MAC), called the Distributed Coordination Function (DCF). In practice, the channel loss rates of nodes vary widely due to the complex characteristics of indoor RF channels. Even receiving nodes that are equi-distant from a common sender experience differing channel conditions []. When the average signal strength at the receiver is lower than the threshold required for successful frame reception, the sender can unilaterally elect to use an alternative coding scheme that exploits the trade-off between data rate and BER []. Transmitting at a lower data rate by using a more resilient modulation scheme leads to higher frame transmission time but reduces the frame loss rate. Figure shows the achieved TCP throughput of a sender as a function of the distance between it and a receiver in a simulated environment. The channel model used in this

2 Data Rates (Mbps) (,5.5) (, ) (,) n s throughput n s throughput Total (Mbps).665. Table : The aggregate throughput is highest when n and n transmit at and 5.5 Mbps respectively. However, at steady state, n lowers its data rate to Mbps to achieve higher throughput, while significantly degrading the aggregate throughput. n cannot benefit by lowering its data rate and thus transmits at Mbps at steady state. simulation is described in detail in Section. For each pair of data rates, there exists a cross-over distance at which using a lower data rate yields higher throughput because the reduction in frame loss rate at the lower data rate is high enough to compensate for the slower transmission rate. We also assume that each node has an implementation of DCF that complies with the 8. specification. Noncompliant malicious nodes are beyond the scope of this paper. In general, each 8. card is equipped with a proprietary implementation of DCF in the form of firmware and undergoes a certification process administered by the Wi- Fi Alliance, a nonprofit international association formed in 999 to certify interoperability of WLAN products based on the 8. specification []. Each competing 8. node can use any 8.- compliant strategy to maximize its achieved throughput. An 8. node can determine, for each frame transmission, the frame size and the data transmission rate. For the rest of this paper, we assume that each competing node uses maximum-sized data frames. If each node uses the most efficient transmission strategy, i.e. the strategy that yields the highest achievable throughput when the node alone occupies the channel, the resulting aggregate throughput will be optimal with respect to a particular allocation of channel capacity. Table shows the achieved TCP throughputs of two sending nodes n and n, each of which sends data to a receiver. The distance between n and its receiver is m whereas the distance between n and its receiver is m. All nodes are within radio range of each other. As shown in Figure, in the absence of contention, the data rates that yield the highest achievable throughputs for n and n are and 5.5 Mbps respectively. However, in the presence of competition, rational node n would lower its data rate to Mbps to increase its achieved throughput by 8%. Unfortunately, this comes at the expense of reducing the aggregate throughput by 6%. Note that n would not benefit by reducing its data rate, so it transmits at Mbps at steady state. The root cause of this behavior is the mechanism used by DCF to dictate how the medium is shared. This variant of the carrier sense multiple access (CSMA) MAC protocol is designed to give an approximately equal probability of channel access (measured in number of transmission opportunities) to each competing node with similar loss characteristics. That is to say, over any period lasting several dozens milliseconds, each node will be able to transmit an equal number of frames, irrespective of the amount of channel time required to transmit the frame. Therefore, n being rational will lower its data rate if the reduction in its frame loss rate potentially results in higher throughput. However, by doing so, the throughput of n as well as the aggregate throughput will be significantly reduced because of the increased time required to transmit n s frames. In general, if a node at a location to the left of a cross-over distance has the channel all to itself, it will never use a data rate lower than its optimal data rate, since doing so would result in reduced throughput. However, in the presence of another competing node, that node may transmit at a lower data rate, since by doing so it can use the channel longer and experience a lower loss rate. As a result, the overall efficiency of the network significantly suffers. In this paper, we: Show through simulation the regions in which DCF allows competing nodes to use strategies that are inefficient in utilizing the shared medium, Argue our position that by guaranteeing the allocation of long-term shares of channel time to competing nodes with respect to a desired fairness constraint, the MAC protocol can force rational nodes to efficiently use the shared medium, thereby improving the achieved throughputs of all competing nodes. The rest of this paper is organized as follows. The next section discusses related work. Section examines the conditions under which DCF forces rational nodes to use inefficient strategies. Section describes our proposed solution at the MAC layer and related preliminary results. We conclude in Section 5 by discussing the potential impact of our work and what we plan to do in the future. Related Work Previous studies [, 9] have discussed some undesirable effects that DCF has on overall network performance when multiple competing nodes use different data rates. For instance, when competing nodes transmit at different data rates, the aggregate throughput, under many conditions, will be dominated by the lowest transmission rate. Tan et al. [9] proposes that multi-rate WLANs use timebased fairness, in which each node is given an equal amount of channel time, as the fairness criterion and explains in detail why time-based fairness is more suit-

3 n m x m x Figure : n and n transmit to m and m respectively. able than throughput-based fairness, in which each node achieves equal throughputs. Our work is independent of the choice of fairness criterion. We analyze the conditions under which DCF allows rational non-cooperative nodes to use inefficient strategies. The observations and results shown in later sections do not depend on a particular notion of fairness but rather concern with the existing mechanics of allocating the channel capacity. To our knowledge, we are the first to show that DCF encourages rational nodes to use undesirable strategies under certain conditions. Analysis In this section, we analyze the conditions that cause rational nodes to intentionally lower their data rates as the result of competition for the wireless channel.. Simulation Environment We use ns [5] to conduct our simulations. RF propagation is modeled using a two-ray ground large-scale radio propagation model and a Rayleigh fast-fading model [6]. The latter models the fading phenomenon on short timescales, which arises due to moving transmitters, receivers, or objects along transmission paths. The received power thresholds for various data rates are based on the Orinoco 8.b Gold Card data sheet. In practice, wireless card vendors employ proprietary autorate adaptation schemes that adjust the data transmission rate based on estimated channel conditions. Our results do not depend on a particular auto-rate protocol. For concreteness in our examples, we use the Receiver Based Auto Rate protocol (RBAR) []. RBAR relies on the existing RTS/CTS (request to send/ clear to send) mechanism, which deals with interference from hidden terminals, to assess the channel conditions experienced by each receiver. In particular, the sender sends an RTS frame and the receiver reports the received signal strength of the RTS frame in a replying CTS frame. Based on the signal strength information, the sender then chooses the highest transmission rate that has a high probability of a successful data frame transmission under the assumption that the channel conditions will remain unchanged for the transmission period. Figure shows in most cases RBAR performs better than any single-rate protocol. n TCP Throughput with RTS/CTS Enabled (Mbps) (A) (B) Mbps 5.5 Mbps Mbps RBAR Distance between sender and receiver (meters) Figure : TCP throughputs achieved when using various fixed data rates and RBAR. A rational node whose transmission path distance is in region (A) or region (B) can benefit under DCF by intentionally using an inefficient strategy when competing against another node with a better channel condition, i.e. a competing node whose transmission path distance is shorter. TCP Throughput (Mbps) n(r,r) Tot(R,R) n(r,) Tot(R,) 6 8 Distance between n and m (meters) Figure : TCP throughputs achieved by n and the aggregate achieved throughputs under two pairs of strategies, (R, ) and (R, R), as a function of the transmission path distance of competing node n. (R, ) denotes that n uses RBAR and n transmits at a fixed data rate of Mbps. T ot plots the aggregate throughputs under a given strategy pair. The most efficient strategy for n is to transmit at 5.5 Mbps, which is what RBAR running at n would do. Thus, (R, R) denotes the most efficient strategy pair yet, at steady-state, (R, ) is used instead since n gains higher throughputs by transmitting at Mbps.. Conditions Leading to Inefficiencies We ran experiments using the setup shown in Figure. There are two TCP flows, one from n to m and the other from n to m. Note that m and m also send TCP acknowledgment packets to n and n respectively. The

4 goal is to investigate under what competition conditions n would benefit by intentionally lowering its data rate. Thus, we fixed the transmission path distance between n and m at meters (i.e. x = 7 m) but varied that between n and m from to meters by moving m. All nodes are within radio transmission range of each other. When both transmitters used RBAR, n achieved lower throughput than n when n s transmission path distance was longer than n s. Notice that the optimal data rate for n would be 5.5 Mbps if n had the channel all to itself (see Figure ). In fact, this was what RBAR did most of the time. However, in the presence of a competing flow, n could achieve higher throughput by transmitting at Mbps. This behavior is evident in Figure, which shows the achieved throughputs of n and the aggregate throughputs as a function of the transmission path distance of competing node n. For example, when n s transmission path distance is m, node n can achieve an % increase in throughput by always transmitting at a lower (inefficient) data rate instead of using RBAR. However, as a result, the achieved throughput of n (not shown in the figure) and the aggregate throughput would decrease by 5% and % respectively. We ran numerous experiments to determine the regions in which a rational node could benefit by transmitting at an inefficient data rate. In Figure, a node whose transmission path distance falls in region A or region B can achieve higher throughputs by intentionally choosing a data rate lower than the most efficient data rate whenever it competes against another node that experiences a lower loss rate. The wide ranges of regions A and B highlight the importance of incorporating mechanisms to reduce inefficiencies as a result of competition among rational but noncooperative nodes. Solutions There are two major ways to keep rational nodes from intentionally using inefficient strategies, i) Stipulate as part of the 8. specification that each card manufacturer implements a rate adaptation scheme that never intentionally uses an inefficient transmission strategy or ii) Modify the MAC protocol so that a node cannot gain additional throughputs by employing an inefficient transmission strategy. The first approach requires that each card manufacturer implements a scheme like RBAR that selects a transmission strategy solely based on channel conditions and not according to the observed throughputs. When each rate adaptation protocol never selects an inefficient strategy intentionally, the resulting aggregate throughputs will be high. This solution although plausible has several drawbacks. First, since each manufacture employs its own proprietary auto-rate protocol, it will become much harder to verify whether a particular product conforms to the specification, and also to detect a malfunctioning or malicious card during the existing Wi-Fi certification process. Second, such a solution can still lead to unpredictable outcomes. This is because the channel capacity allocation among nodes can vary over time as DCF continues to allocate varying amounts of channel time according to the differing data rates used by competing nodes. Unpredictable capacity allocations may not be desirable for streaming media applications which often demand consistent allocations of the channel capacity. An alternative approach is to develop an ideal MAC protocol that prevents a node s transmission strategy from affecting its share of channel time. Thus, the only way a node can maximize its throughput is by using its share of allocated channel time efficiently. Each card manufacturer can still employ a proprietary rate adaptation protocol to maximize the node s achieved throughput, but no such scheme can benefit by using an inefficient strategy. The rest of this section discusses how to develop such a MAC protocol.. Impact of Limiting Burst Duration For 8.-based wireless LANs, channel occupancy time, not the transmission opportunities, is the fundamental resource that needs to be shared among competing nodes. The channel occupancy time of a node is the total channel time used to transmit data frames. The time needed to transfer a data frame includes i) the transmission time of the data frame, ii) the transmission time of a synchronous MAC-layer acknowledgment, iii) the inter-frame idle periods as required by DCF and iv) the time required to transmit RTS and CTS frames when necessary. It appears that if one fixes the amount of channel time a node garners per transmission opportunity as well as the probability of gaining transmission opportunities, a rational node will not intentionally lower its data rate since it cannot gain a higher amount of channel time by doing so. Unfortunately, this is not the case. The reason is because for a given channel condition, the average number of frames transmitted per transmission opportunity or the average burst length varies with the data rate used since: The maximum number of successive frames that can be successfully transmitted varies depending upon channel conditions. For instance, a sending node can almost always successfully transmit bursts of 5 consecutive frames at Mbps to a receiver meters away. But, when the same amount of frames is used to transmit to a receiver meters away, the node will almost always experience a frame loss (within each burst). Each frame in a burst is still acknowledged and retransmitted in the usual manner.

5 DCF requires all nodes to use an exponential backoff scheme. As soon as a frame loss is detected, DCF will perform a backoff by picking a random number of slots between and the contention window size cw, which is doubled for every consecutive loss. A node cannot attempt any transmission during the backoff period. When two nodes that have different average burst lengths compete against each other, the node with a smaller burst length will use a smaller share of channel time since it cannot make use of the maximum time allowed for each burst transmission. Therefore, that node may intentionally lower its data rate to obtain a higher fraction of channel time (by using up all of its allowed channel time in an inefficient manner) and to reduce its loss rate while reducing the aggregate throughput. One may argue that DCF s backoff algorithm can be modified so that a node only backs off after sending the maximum number frames in each transmission opportunity, regardless of failures within the burst. Such a technique can potentially prevent rational nodes from intentionally lowering their data rates. However, it can also lead to lower overall network efficiency for the following reasons. In indoor mobile environments, channel conditions are time-correlated on short time scales due to multipath and mobility [7], and thus, whenever a frame transmission fails due to channel errors, it is likely that successive frame transmissions will also fail. Thus, when multiple nodes are competing for channel access and losses are bursty (as they often do [, 8]), a node will avoid likely failed transmissions by backing off as soon as it experiences a frame loss. Meanwhile, a competing node with a better channel condition can transmit, improving the overall efficiency. Studies have observed that the channel qualities of different transmission paths are often independent [, 8]. Therefore, the existing backoff scheme of DCF that requires a node to back off as soon as a loss is encountered can potentially improve the overall network efficiency in the presence of competition. We note that the 8.e working group is currently drafting a standard containing specification of an enhanced version of DCF (EDCF) that allows nodes to transmit bursts of frames in a similar manner as we have presented here. For the reasons explained in this subsection, EDCF can force rational nodes to use inefficient strategies under some conditions.. Long-term Time-share Guarantees Work We propose that the MAC protocol: Determines the desired long-term allocation of the shared medium based on channel time, instead of TCP Throughput (Mbps) n(r*,r*) Tot(R*,R*) n(r,) Tot(R,) 6 8 Distance between n and m (meters) Figure 5: TCP throughputs achieved by n and the aggregate throughputs as the transmission path distance of competing node n varies. As explained in Figure, under DCF, n gains higher throughputs by transmitting at a less efficient rate of Mbps. n(r, ) and T ot(r, ) plot the achieved throughputs of n and the aggregate throughputs under DCF respectively. Under hypothetical MAC protocol DCF, using (R, R ) leads to the highest achieved throughputs for both nodes. T ot(r, R ) plots the aggregate throughputs under DCF, which are superior to those achieved under DCF. transmission opportunities, Limits the amount of channel time used per transmission opportunity (for the sole purpose of avoiding starvation), and Dynamically allocates the probability of transmission opportunities as a function of the observed channel time share so that the observed long-term global allocation of channel time is not affected by the transmission strategies used by nodes. When the MAC protocol provides long-term channel time guarantees, rational competing nodes, knowing that they cannot gain additional channel time under any circumstances, will choose the most efficient strategies for the observed channel conditions. DCF s distributed random backoff mechanism dictates the allocation of transmission opportunities for competing nodes. As we explained earlier, the contention window size is doubled with each loss experienced. Conversely, if the previous frame transmission is successful, the contention window is reset to a pre-determined minimum value, cw min. Under DCF, cw min for each node is. Under our proposed approach, cw min of each node will be adjusted based on its observed channel time share. We note that other approaches such as directly adjusting the contention window size for each frame transmission (instead of cw min ) are also possible.

6 In practice, when competing nodes experience varying loss characteristics, DCF does not provide long-term guarantees of either transmission opportunities (because of different average backoff times) or channel time shares (because of varying per-frame channel times). In the DCF example of the previous section, the ratio of channel time shares used by n and n (at m away from m) was.6 when n was using the most efficient data rate (with RBAR). When n optimized its local throughput by transmitting at the less efficient data rate of Mbps, the ratio rose to.7. Under our approach, any desired allocation of long-term channel occupancy time can be ensured. To illustrate potential realizable gains under our approach, we assume that a desired ratio of channel time shares of n to n of.7. Clearly, this desired goal is not achievable under DCF if n uses RBAR. Under our approach, n will be assigned a larger probability of winning transmission opportunities than under DCF, so that the system achieves the desired long-term allocation of channel time. For this particular example, we set cw min = 6 for n and m, and cw min = 6 for n and m. Figure 5 shows that under DCF, i.e. DCF with our modifications, the achieved throughput of n using RBAR, n(r, R ), is always higher than what n achieved by always transmitting at Mbps under DCF, n(r, ). In practice, cw min should be dynamically adjusted in a distributed fashion as a function of the observed and desired channel time shares. This ensures that the long-term channel time share of a node will be the same regardless of the data rate used. Therefore n, being rational, will not lower its data rate under DCF, and aggregate throughput is improved by as much as %. Unlike the other approach of stipulating auto-rate protocol as part of the specification, this approach allows for easier testing and verification of a particular implementation of the MAC protocol, since the behaviors of a specificationcompliant MAC can be easily understood. 5 Discussion The proliferation of hotspots and independently manged WLANs leads to a situation in which there is increasing competition for the wireless channel by non-cooperative devices. The MAC layer protocols in use today, namely DCF and its future successor EDCF, encourage rational nodes to use inefficient strategies under some realistic conditions, degrading aggregate network performance. We also showed that long-term channel time share guarantees (rather than transmission opportunity guarantees) can be used to ensure that rational competing nodes use the channel time allocated to them in the most efficient manner. A MAC protocol can achieve this goal by dynamically adjusting in a distributed manner the contention window size of each node as a function of its observed channel time share. We believe that such a scheme is practical and should be built into future 8. standards so that the 8.- compliant devices use efficient strategies. There are two major challenges in developing such a scheme. First, each node must observe its share of channel time. The information needed to do this is already available under DCF, since a node knows the time taken to transfer its own frames and can infer the time taken by neighboring nodes from existing physical and virtual carrier sensing mechanisms. Second, each node must periodically determine either its contention window size or cw min as a function of its channel time share. This must be done in a way that ensures the convergence of the observed global channel time allocation to the desired allocation. We are currently developing such a scheme. We believe that the increased protocol complexity will be more than offset by realizable significant performance gains in non-cooperative environments, but have yet to demonstrate this experimentally. References [] Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel, and Andrzej Duda. Performance anomaly of 8.b. In INFOCOM, April. [] Gavin Holland, Nitin H. Vaidya, and Paramvir Bahl. A rateadaptive MAC protocol for multi-hop wireless networks. In Mobile Computing and Networking, pages 6 5,. [] David Kotz, Calvin Newport, and Chip Elliott. The mistaken axioms of wireless-network research. Technical Report TR-67, Dept. of Computer Science, Dartmouth College, July. [] Allen Miu, Godfrey Tan, Hari Balakrishnan, and John Apostolopoulos. Divert: Fine-grained Path Selection for Wireless LANs. In Proc. of ACM Mobisys, Boston, MA, Jun. [5] ns- Network Simulator. vint/nsnam/. [6] R. Punnoose, P. Nikitin, and D. Stancil. Efficient simulation for Ricean fading within a packet simulator. In IEEE Vehicular Technology Conference, pages ,. [7] T.S. Rappaport. Wireless Communications. Prentice Hall, Upper Saddle River, N.J., 996. [8] B. Sadeghi, V. Kanodia, A. Sabharwal, and E. Knightly. Opportunistic media access for multirate ad hoc networks. In MOBICOM, sept. [9] Godfrey Tan and John Guttag. Time-based Fairness Improves Performance in Multi-rate WLANs. In Proc. of the Usenix Annual Technical Conference, Boston, MA, June. [] Wi-Fi Alliance Web Site.

Multi-Rated Packet Transmission Scheme for IEEE WLAN Networks

Multi-Rated Packet Transmission Scheme for IEEE WLAN Networks Multi-Rated Packet Transmission Scheme for IEEE 802.11 WLAN Networks Namgi Kim Telecommunication R&D Center, Samsung Electronics, 416, Maetan-3, Youngtong, Suwon, Kyounggi, 442-600, Korea namgi.kim@samsung.com

More information

Implementing a Cooperative MAC Protocol for Wireless LANs

Implementing a Cooperative MAC Protocol for Wireless LANs Implementing a Cooperative MAC Protocol for Wireless LANs Thanasis Korakis +, Sathya Narayanan α, Abhijit Bagri, Shivendra Panwar + + Department of Electrical and Computer Engineering, Polytechnic University,

More information

ERBAR: an Enhanced Receiver-Based Auto-Rate MAC Protocol for Wireless Ad Hoc Networks

ERBAR: an Enhanced Receiver-Based Auto-Rate MAC Protocol for Wireless Ad Hoc Networks ERBAR: an Enhanced Receiver-Based Auto-Rate MAC Protocol for Wireless Ad Hoc Networks Zhifei Li, Anil K. Gupta, and Sukumar Nandi School of Computer Engineering, Nanyang Technological University, Singapore-639798

More information

Wireless Network Security Spring 2012

Wireless Network Security Spring 2012 Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #10 MAC Layer Misbehavior Announcements I'll be in Pittsburgh Feb 28-29 If you or your project team would like to meet, email me to schedule

More information

A Rate-adaptive MAC Protocol Based on TCP Throughput for Ad Hoc Networks in fading channels

A Rate-adaptive MAC Protocol Based on TCP Throughput for Ad Hoc Networks in fading channels A Rate-adaptive MAC Protocol Based on TCP Throughput for Ad Hoc Networks in fading channels Shoko Uchida, Katsuhiro Naito, Kazuo Mori, and Hideo Kobayashi Department of Electrical and Electronic Engineering,

More information

Wireless Networks (MAC)

Wireless Networks (MAC) 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

Performance anomaly of b

Performance anomaly of b Laboratoire LSR Logiciels Systèmes Réseaux Software, Systems, Networks Performance anomaly of 802.11b Andrzej Duda LSR-IMAG Andrzej.Duda@imag.fr Joint work with Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel

More information

The title of the publication is: The number of words: Illustrations: eleven figures and one table

The title of the publication is: The number of words: Illustrations: eleven figures and one table The title of the publication is: IEE PROCEEDINGS COMMUNICATIONS The number of words: 7990 Illustrations: eleven figures and one table Corresponding author: Zhifei Li Center for Multimedia and Network Technology

More information

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD. Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture

More information

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Ghazale Hosseinabadi and Nitin Vaidya Department of ECE and Coordinated Science Lab. University of Illinois at Urbana-Champaign

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #10 MAC Layer Misbehavior MAC Misbehavior Agenda Analysis of the 802.11 MAC protocol Selfish / greedy 802.11 MAC misbehavior Malicious 802.11

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

Performance Anomaly of b

Performance Anomaly of b Performance Anomaly of 8.11b Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel, Andrzej Duda LSR-IMAG Laboratory Grenoble, France email: {heusse, rousseau, gberger, duda}@imag.fr Abstract We analyze

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #9 MAC Misbehavior; OMNET++ Tutorial II 1 Reminder: Assignments Assignment #2 is due today 11:59pm PST Assignment #3 is posted, due March 5 It's

More information

RARA: Rate Adaptation Using Rate-adaptive Acknowledgment for IEEE WLANs

RARA: Rate Adaptation Using Rate-adaptive Acknowledgment for IEEE WLANs : Rate Adaptation Using Rate-adaptive Acknowledgment for IEEE 8. WLANs Hakyung Jung,KideokCho, Yongho Seok, Taekyoung Kwon and Yanghee Choi School of Computer Science and Engineering, Seoul National University,

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #12 MAC Misbehavior 1 IEEE 802.11 Infrastructure mode Many stations share an AP connected to Internet Distributed coordination function

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Fair Time Sharing Protocol: a Solution for IEEE b Hot Spots

Fair Time Sharing Protocol: a Solution for IEEE b Hot Spots Fair Time Sharing Protocol: a Solution for IEEE 802.11b Hot Spots Anelise Munaretto 1,2, Mauro Fonseca 1,4, Khaldoun Al Agha 2,3, and Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 75015 Paris,

More information

On the Performance Characteristics of WLANs: Revisited

On the Performance Characteristics of WLANs: Revisited On the Performance Characteristics of WLANs: Revisited S. Choi,, K. Park and C.K. Kim Sigmetrics 2005 Banff, Canada Presenter - Bob Kinicki Advanced Computer Networks Fall 2007 Outline Introduction System

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007 Lecture 4: Wireless LANs and IEEE 802.11 Part II This lecture continues the study of wireless LANs by looking at IEEE 802.11. I. 802.11

More information

Improving IEEE Power Saving Mechanism

Improving IEEE Power Saving Mechanism 1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Accurate Assessment of Link Loss Rate in Wireless Mesh Networks

Accurate Assessment of Link Loss Rate in Wireless Mesh Networks Accurate Assessment of Link Loss Rate in Wireless Mesh Networks Bing Qi, Saad Biaz qibing1@auburn.edu, biazsaa@auburn.edu Technical Report CSSE08-02 Dept. of Computer Science and Software Engineering Auburn

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

Enhancing the DCF mechanism in noisy environment

Enhancing the DCF mechanism in noisy environment Enhancing the DCF mechanism in noisy environment 1 LICP EA 2175 Université de Cergy-Pontoise 3 Av Adolph Chauvin 9532 Cergy-Pontoise France Email: {adlen.ksentini, mohamed.naimi}@dept-info.u-cergy.fr Adlen

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments -

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments - Outline Opportunistic Communication - with a focus on WLAN environments - Jong-won Lee 2006. 02.20. Background? Wireless Channels? Opportunistic communication? Examples? Basics of WLAN Previous Works?

More information

A Survey on Modified RTS/CTS Mechanism

A Survey on Modified RTS/CTS Mechanism A Survey on Modified RTS/CTS Mechanism Prachi Srivastava Computer Science and Engineering, MMMEC, Gorakhpur prachi.srivastava.itm@gmail.com Dayashankar Singh Computer Science and Engineering, MMMEC, Gorakhpur

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Interference avoidance in wireless multi-hop networks 1

Interference avoidance in wireless multi-hop networks 1 Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

Distributed Call Admission Control for Ad Hoc Networks

Distributed Call Admission Control for Ad Hoc Networks Distributed Call Admission Control for Ad Hoc Networks Shahrokh Valaee and Baochun Li Abstract This paper introduces a distributed call admission controller for ad hod networks. The call admission controller

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Collisions & Virtual collisions in IEEE networks

Collisions & Virtual collisions in IEEE networks Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing

More information

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.771

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University

More information

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks Enhanced Power Saving Scheme for IEEE 802.11 DCF Based Wireless Networks Jong-Mu Choi, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication Ajou University, Republic of Korea

More information

CARA: Collision-Aware Rate Adaptation for IEEE WLANs

CARA: Collision-Aware Rate Adaptation for IEEE WLANs CARA: Collision-Aware Rate Adaptation for IEEE 80. WLANs Jongseok Kim Seongkwan Kim Sunghyun Choi School of Electrical Engineering and INMC Seoul National University Seoul, 5-744, Korea {jskim,skim}@mwnl.snu.ac.kr

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

IEEE Ad Hoc Networks: Performance Measurements

IEEE Ad Hoc Networks: Performance Measurements IEEE 8.11 Ad Hoc Networks: Performance Measurements Giuseppe Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 561 Pisa, Italy Email: g.anastasi@iet.unipi.it Eleonora Borgia,

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD Page 1 Outline 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless Peter Steenkiste Data link fundamentals» And what changes in wireless Aloha Ethernet Wireless-specific

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

Multi-channel MAC with Dynamic Channel Selection for Ad Hoc Networks

Multi-channel MAC with Dynamic Channel Selection for Ad Hoc Networks Multi-channel MAC with Dynamic Channel Selection for Ad Hoc Networks Asis Nasipuri and Jai Mondhe Department of Electrical & Computer Engineering The University of North Carolina at Charlotte Charlotte,

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

Evaluation of adaptive rate control scheme for ad-hoc networks in fading environments

Evaluation of adaptive rate control scheme for ad-hoc networks in fading environments Evaluation of adaptive rate control scheme for ad-hoc networks in fading environments Katsuhiro Naito, Kazuo Mori, and Hideo Kobayashi Graduate School of Engineering, Mie University Tsu, Mie, Japan, 514-857

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations Marek Natkaniec, Andrzej R. Pach University of Mining and Metallurgy, Department of Telecommunications, Cracow, Poland

More information

Proceedings of the General Track: 2004 USENIX Annual Technical Conference

Proceedings of the General Track: 2004 USENIX Annual Technical Conference USENIX Association Proceedings of the General Track: 24 USENIX Annual Technical Conference Boston, MA, USA June 27 July 2, 24 24 by The USENIX Association All Rights Reserved For more information about

More information

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité )

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité ) Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité ) Prof. J.-P. Hubaux February 12, 2004 Duration: 2 hours, all documents allowed Please write your answers on these sheets, at the

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs Nakjung Choi, Seongil Han, Yongho Seok, Yanghee Choi and Taekyoung Kwon School of Computer Science

More information

Wireless Local Area Network (IEEE )

Wireless Local Area Network (IEEE ) Wireless Local Area Network (IEEE 802.11) -IEEE 802.11 Specifies a single Medium Access Control (MAC) sublayer and 3 Physical Layer Specifications. Stations can operate in two configurations : Ad-hoc mode

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW Lecture 24: 802.11 CSE 123: Computer Networks Stefan Savage HW4 due NOW About the final Similar in style to midterm Some combination of easy questions, short answer and more in-depth questions Sample final

More information

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users Static Channel Allocation: Frequency Division Multiplexing

More information

2 Related Work. 1 Introduction. 3 Background

2 Related Work. 1 Introduction. 3 Background Modeling the Performance of A Wireless Node in Multihop Ad-Hoc Networks Ping Ding, JoAnne Holliday, Aslihan Celik {pding, jholliday, acelik}@scu.edu Santa Clara University Abstract: In this paper, we model

More information

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model.

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model. IEEE P802.11 Wireless LANs Extension of Bluetooth and 802.11 Direct Sequence Interference Model Date: November 11, 1998 Author: Jim Zyren Harris Semiconductor Melbourne, FL, USA Phone: (407)729-4177 Fax:

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi Overview 15-441 15-441: Computer Networking 15-641 Lecture 21: Wireless Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15-441-f17 Link layer challenges and WiFi WiFi Basic WiFi design Some

More information

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE802.11 WIRELESS NETWORKS Daqing Gu and Jinyun Zhang TR-2003-51 May 2003 Abstract In this paper,

More information

Improving the Multiple Access Method of CSMA/CA Home Networks

Improving the Multiple Access Method of CSMA/CA Home Networks Improving the Multiple Access Method of CSMA/CA Home Networks Miguel Elias M. Campista, Luís Henrique M. K. Costa, and Otto Carlos M. B. Duarte Universidade Federal do Rio de Janeiro - PEE-COPPE/DEL-POLI

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Call Admission Control for IEEE Contention Access Mechanism

Call Admission Control for IEEE Contention Access Mechanism Call Admission Control for IEEE 82.11 Contention Access Mechanism Dennis Pong and Tim Moors School of Electrical Engineering and Telecommunications, The University of New South Wales, Australia Email:

More information

Rate-Adaptive MAC Protocol in High-Rate Personal Area Networks

Rate-Adaptive MAC Protocol in High-Rate Personal Area Networks Rate-Adaptive MAC Protocol in High-Rate Personal Area Networks Byung-Seo Kim, Yuguang Fang and Tan F. Wong Department of Electrical and Computer Engineering University of Florida Gainesville, Florida,

More information

Facilitating Access Point Selection in IEEE Wireless Networks

Facilitating Access Point Selection in IEEE Wireless Networks Facilitating Access Point Selection in IEEE 802.11 Wireless Networks S. Vasudevan, K. Papagiannaki, C. Diot, J. Kurose and D. Towsley Dept. of Computer Science, Intel esearch University of Massachusetts,

More information

CERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research

CERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research CERIAS Tech Report 2004-115 A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research Information Assurance and Security Purdue University, West

More information

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network *

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network * Performance Evaluation of Modified IEEE 802.11 MAC for Multi-Channel Multi-Hop Ad Hoc Network * Jiandong LI ISN Lab., Xidian University JL384@cornell.edu Zygmunt J. Haas Cornell University haas@ece.cornell.edu

More information

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may

More information

EBA: An Enhancement of IEEE DCF via Distributed Reservation

EBA: An Enhancement of IEEE DCF via Distributed Reservation EBA: An Enhancement of IEEE 802.11 DCF via Distributed Reservation Jaehyuk Choi, Joon Yoo, Sunghyun Choi, Member, IEEE, and Chongkwon Kim, Member, IEEE Abstract The IEEE 802.11 standard for Wireless Local

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

A Measurement Study of Path Capacity in b based Wireless Networks

A Measurement Study of Path Capacity in b based Wireless Networks A Measurement Study of Path Capacity in 802.11b based Wireless Networks Tony Sun, Guang Yang, Ling-Jyh Chen, M.Y. Sanadidi, Mario Gerla Department of Computer Science, UCLA {tonysun, yangg, cclljj, medy,

More information

Handover Incentives: Revised Model with Extensions for Uplink Traffic

Handover Incentives: Revised Model with Extensions for Uplink Traffic Handover Incentives: Revised Model with Extensions for Uplink Traffic Xenofon Fafoutis 1 and Vasilios A. Siris 1, 2 1 Institute of Computer Science, Foundation for Research and Technology Hellas Heraklion,

More information

Multi-rate Opportunistic Spectrum Access in Multi-hop Ad Hoc Networks

Multi-rate Opportunistic Spectrum Access in Multi-hop Ad Hoc Networks 22nd IEEE Personal Indoor Mobile Radio Communications Multi-rate Opportunistic Spectrum Access in Multi-hop Ad Hoc Networks Ari Raptino H Graduate school of Shizuoka University Hamamatsu, Japan Email:

More information

IEEE P Wireless LANs Impact of Bluetooth on Direct Sequence. Abstract

IEEE P Wireless LANs Impact of Bluetooth on Direct Sequence. Abstract IEEE P802.11 Wireless LANs Impact of Bluetooth on 802.11 Direct Sequence Date: September 15, 1998 Author: Greg Ennis Ennis Associates 16331 Englewood Ave. Los Gatos CA 95032 USA Phone: (408) 358-5544 Fax:

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

CARA: Collision-Aware Rate Adaptation for IEEE WLANs. Presented by Eric Wang

CARA: Collision-Aware Rate Adaptation for IEEE WLANs. Presented by Eric Wang CARA: Collision-Aware Rate Adaptation for IEEE 802.11 WLANs Presented by Eric Wang 1 Outline Introduction Related Work Preliminaries CARA Performance Evaluation Conclusion and Future Work 2 Basic CSMA/CA

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)

More information

Performance evaluation of Cooperative MAC and ZRP in Cooperative Communication Networking Environment

Performance evaluation of Cooperative MAC and ZRP in Cooperative Communication Networking Environment Performance evaluation of Cooperative MAC and ZRP in Cooperative Communication Networking Environment N Charan 1, Dr. Sreerangaraju M.N 2, Nagesh R 3 P.G. Student, Department of Electronics & Communication

More information

Throughput Optimization and Fair Bandwidth Allocation in Multi-Hop Wireless LANs

Throughput Optimization and Fair Bandwidth Allocation in Multi-Hop Wireless LANs Throughput Optimization and Fair Bandwidth Allocation in Multi-Hop Wireless LANs Qunfeng Dong Department of Computer Sciences University of Wisconsin-Madison Madison, WI, USA Email: qunfeng@cs.wisc.edu

More information

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mobile & Wireless Networking. Lecture 7: Wireless LAN 192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications

More information